|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1240164798 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cn||||||||| |
007 |
vz czazuu |
008 |
120121s2020 xx --- o vleng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCO
|d NZCPL
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1260702562
|a 1305872424
|
020 |
|
|
|a 9781801079396
|
020 |
|
|
|a 1801079390
|
024 |
8 |
|
|a 9781801079396
|
029 |
1 |
|
|a AU@
|b 000068858047
|
035 |
|
|
|a (OCoLC)1240164798
|z (OCoLC)1260702562
|z (OCoLC)1305872424
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zot, Cristi,
|e author.
|
245 |
1 |
0 |
|a Python for Penetration Testers /
|c Zot, Cristi.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 1 hr., 57 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
365 |
|
|
|b 90.99
|
520 |
|
|
|a Develop your Python skills to get started with penetration testing and cybersecurity About This Video Learn how to use Python for penetration testing Get to grips with the socket and Scapy module Uncover techniques to efficiently execute cybersecurity tasks In Detail Penetration testers and cybersecurity analysts often get into the situation of having to do repetitive tasks that take away precious time from their active focus. Examples of such situations can be scanning targets, doing intensive enumeration, subdomain discovery, reconnaissance, and more. This course will teach you how to use Python programming to greatly expand your skills as a cybersecurity professional. The course starts by showing you how to gather banners, host name, and IP lookup. Next, you will learn to use Nmap to build a basic port scanner and learn how to grab screenshots with Python. Moving along, you will get to grips with the socket and Scapy module and grasp techniques for attacking web forms with requests using Python. Next, you will discover subdomains and crack hashes using Python and a hash library. Towards the end, you will learn how to spoof your Media Access Control (MAC) address and find hidden wireless networks. By the end of this course, you will have the skills to use Python for penetration testing and cybersecurity.
|
542 |
|
|
|f Packt Publishing
|g 2020
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title screen (viewed December 28, 2020).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781801079396/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|